Name: Ramya K
Phone:469-***-****
Email: ***********@*****.***
LinkedIn: https://www.linkedin.com/in/ramyaruchitha/
PROFESSIONAL SUMMARY
IAM Engineer with over 7 years of professional experience in Identity and Access Management (IAM), including SailPoint IIQ, Okta, CyberArk, and Java-based web development.
Skilled in SailPoint IIQ (v6–v8) deployment and maintenance across Windows and Linux environments.
Strong working knowledge of IAM modules: User Management, Account Management, Role Management, Entitlement Management, Password Management, Lifecycle Management, MFA, SSO, and Directory Services.
Investigated and resolved IAM-related issues including login failures, SSO integration issues, MFA troubleshooting, and access provisioning errors.
Expertise in integrating SailPoint with enterprise systems such as Active Directory (AD), Azure AD, LDAP, ServiceNow, Workday, SAP, Oracle Applications, and PAM tools.
Worked extensively with SailPoint connectors like Delimited File, JDBC, LDAP, AD, Azure AD, and SAP, including custom connector development.
Developed and integrated custom workflows, provisioning rules, policies, and email templates tailored to business access needs.
Experience with Groups and Populations to identify identities using factory attributes and improve role-based targeting.
Implemented RBAC, ABAC, PBAC models, including role mining and entitlement analysis to enforce least privilege access.
Delivered Privileged Access Management (PAM) integrations using CyberArk, aligning with zero-trust security principles.
Process and review access requests from users and approvers through SailPoint's request portal and ensure correct routing and approval.
Led the creation of SailPoint certification campaigns such as Application Owner, Entitlement Owner, and Advanced Certifications.
Generated custom reports and dashboards in SailPoint to track user access, policy violations, and support internal/external audits.
Deep knowledge of global compliance standards including SOX, GDPR, HIPAA, PCI DSS, CCPA, and PIPL for access governance and audit readiness.
Executed advanced operations using SailPoint Identity IQ (IIQ) Console, including object checkout, artifact import, connector debugging, and configuration management to support smooth deployment and troubleshooting activities.
Configured and utilized IQ Service in conjunction with SailPoint Identity IQ to enable secure, real-time provisioning and deprovisioning of user accounts and groups in Active Directory (AD), streamlining identity lifecycle management.
Designed and implemented Okta Lifecycle Management (LCM) workflows to automate onboarding/offboarding using SCIM integrations.
Set up and configured direct connectors for key enterprise systems including Active Directory (AD), LDAP, MySQL, Oracle, and EPIC, enabling seamless integration with SailPoint Identity IQ for real-time provisioning, data aggregation, and access governance.
Created and maintained a centralized registry capturing critical information for all onboarded applications, including connector configurations, schema attributes, application owners, and provisioning details—ensuring transparency, streamlined operations, and audit readiness.
Developed custom login flows and integrated Okta with SSO using SAML 2.0, OIDC, and OAuth 2.0 protocols.
Worked on delegated authentication, LDAP & AD integration, MFA enablement, sign-on and password policies, and application access restrictions.
Troubleshot Okta-specific user issues such as login failures, MFA enforcement, profile sync issues, and access policy configurations.
Collaborated with application and security teams to integrate critical applications into the Ping platform for centralized access management.
I am skilled in Java, J2EE, Spring Security, RESTful Web Services, XML, and microservices for IAM enhancement and custom integrations.
Strong understanding of SQL/PLSQL, with experience in Oracle DB, MySQL, and SQL Server for managing identity repositories.
Used Eclipse, JDeveloper, and application servers like Tomcat and Oracle WebLogic for development and deployment.
Hands-on with DevOps tools including Git, Jenkins, and Docker for CI/CD pipelines and SailPoint configuration deployments
Migrated 100K+ identities and 30+ apps from legacy IAM system to SailPoint IIQ hosted in AWS with full compliance coverage
Proficient in Agile/Scrum methodologies, working cross-functionally with security, infrastructure, HR, and compliance teams.
Actively participated in daily stand-ups, sprint planning, retrospectives, and technical discussions to deliver IAM solutions on time.
TECHNICAL SKILLS
IAM Platforms
SailPoint Identity IQ, Identity Now, Okta, CyberArk.
Tools & Integrations
ServiceNow, Workday, PeopleSoft, SuccessFactors, Web Services,
JDBC, SAP, Oracle, Eclipse.
Languages/ Technologies
Java, XML, Bean Shell, Python, PowerShell.
Database
MySQL, MS-SQL, PostgreSQL, Oracle, DB2.
Operating Systems
Windows and Linux
Access Management
Single Sign-On & Multi-Factor Authentication, RBA, Authentication
& Authorization (SAML, OAuth, OpenID Connect, FIDO)
Application Server
Apache web server, WebLogic, Tomcat
Directory Services
Active Directory, LDAP Microsoft Azure AD
Security & Compliance
SOX, HIPAA, GDPR, Privileged Threat Analytics, Risk Framework
WORK EXPERIENCE
CVS Health, USA.
Role: IAM Engineer Apr 2023 -Present
Design, implement, and maintain enterprise-wide Identity and Access Management (IAM) solutions to ensure secure and compliant access to corporate resources.
Develop and configure application connectors using LDAP, Active Directory (AD), JDBC, REST APIs, and custom connectors within SailPoint Identity IQ and Identity Now.
Automate user lifecycle management by creating and optimizing workflows for Joiners, Movers, and Leavers.
Build and enforce access control models including Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Policy-Based Access Control (PBAC).
Develop custom rules, Java classes, and PowerShell scripts to extend IAM capabilities and support business-specific requirements.
Implement and manage SSO, MFA, and federated identity using SAML 2.0, OAuth 2.0, OIDC, and WS-Federation protocols.
Collaborate with security, compliance, and audit teams to run access reviews, certification campaigns, and generate audit-ready reports.
Designed and implemented Joiner, Mover, and Leaver workflows to automate user lifecycle management and improve access accuracy.
Integrate IAM systems with PAM solutions such as CyberArk to secure privileged credentials and automate credential management.
Developing SailPoint IIQ rules, including map rules, creation rules, exclusion and correlation rules, manager correlation rules and various custom rules with bean shell and tasks as per business requirements
Customizing approval process i.e., request route for multi-approval.
Work on SailPoint IIQ modules such as Certifications, Policy Management, and RBAC to support governance needs.
Manage Groups and Populations based on factory attributes, integrating with Azure AD, Okta, and other identity providers.
Led the migration of IAM infrastructure to AWS Cloud, ensuring high availability, scalability, and alignment with compliance standards.
Configured and maintained logging using Log4j, implementing real-time monitoring to detect unauthorized access and anomalous activities.
Developed custom integrations with systems such as ServiceNow and internal databases to automate identity operations and improve efficiency.
Delivered end-user training, created comprehensive technical documentation, and provided ongoing support to ensure successful IAM adoption.
participated in IAM platform upgrades, applied patches, and performed system tuning to maintain platform stability and security.
I have set up Multi Factor Authentication (MFA) for all the applications in scope to Okta such as Okta push, Okta verify, SMS authentication, Voice call authentication and Security questions.
Diagnosed and resolved IAM-related issues, working closely with cross-functional teams and external vendors for timely solutions.
Enforced least privilege access principles and contributed to the design of Segregation of Duties (SOD) policies to reduce risk.
Environment: SailPoint Identity IQ, Identity Now, LDAP, Active Directory, JDBC, Java, PowerShell, SQL, RPA (UiPath), SSO, MFA, SAML, OAuth, OpenID Connect, WS-Federation, RBAC, ABAC, PBAC, CyberArk, Okta, Azure AD, AWS Cloud, Log4j, ServiceNow Integration, Compliance Audits, Privileged Access Management, Workflow Automation, Role Mining, Access Certification, Security Governance
Workday, USA. Mar 2021 - Apr 2023
Role: IAM Engineer
Responsibilities:
led a cross-functional team of IAM analysts and engineers to implement enterprise-wide identity governance initiatives.
Took ownership of the Identity and Access Management (IAM) infrastructure using SailPoint and Okta, ensuring secure and compliant user access management.
Designed and implemented Joiner, Mover, and Leaver workflows to automate user lifecycle management and improve access accuracy.
Reduced user provisioning time by 60% through end-to-end automation of Joiner-Mover-Leaver workflows.
Collaborated with application and security teams to onboard new systems integrating Single Sign-On (SSO), Multi-Factor Authentication (MFA), and identity governance controls.
Strengthening security on cloud platforms like AWS by applying best practices in access management and continuous monitoring.
Responsible for gathering Business Requirements related to on boarding & off boarding.
Integrated various applications from Okta Integrated Network.
I worked on User life cycle management, Workflows and Application on boarding using Okta.
Worked on SAML integration with Okta, Delegated authentication, AD Integration, LDAP Integration, Multi factor Enablement, sign on policies, Password policies, Custom login flows development using Okta APIs.
Led the development and enforcement of Role-Based Access Control (RBAC), MFA, and SSO initiatives to enhance both security and user experience.
Delivered customized Okta solutions for seamless authentication and user lifecycle management tailored to customer needs.
Automated repetitive IAM tasks with Robotic Process Automation (RPA) tools, reducing manual errors and boosting efficiency.
Worked on SSR & generated reports and worked on 24x7 environments and Generated reports and analyzing the Systems Logs to provide technical support for 24*7.
Utilized IQ Service within SailPoint Identity IQ to automate Active Directory provisioning and user account management.
Deployed out-of-the-box SailPoint connectors for systems like LDAP, Active Directory, and databases to streamline provisioning and access reviews.
Created PowerShell scripts for provisioning and management of Exchange and Office 365 accounts, integrated with IAM workflows.
Partnered with security teams to conduct access governance audits, ensuring compliance with internal and external regulations.
Participated in all SailPoint deployment activities like connector configuration, custom rule development, workflow configuration and development, and third-party system integration.
Configure and manage logging frameworks like Log4j and implement real-time monitoring tools to detect and respond to suspicious activities and unauthorized access attempts.
Develop custom connectors and integration points with external systems including ServiceNow, databases, and enterprise applications to streamline access management.
Provide end-user training, create technical documentation, and offer ongoing support to ensure effective use and adoption of IAM solutions.
Developed and executed comprehensive SIT and UAT test cases to validate IAM workflows, connectors, and provisioning logic, ensuring alignment with business and security requirements.
Trained clients on managing IAM infrastructure, including SailPoint administration, access reviews, and best practices for system monitoring and lifecycle operations.
Environment: SailPoint Identity IQ, Okta, AWS Cloud Security, Active Directory (AD), LDAP, Robotic Process Automation (RPA), PowerShell Scripting, Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), Single Sign-On (SSO), Service, Access Certification, Compliance Audits, Identity Governance, Workflow Automation.
Wells Fargo, USA. Jan 2018 - Mar 2021
Role: IAM Engineer
Responsibilities:
Led the onboarding of enterprise applications into SailPoint using connectors like Delimited, JDBC, and Active Directory, ensuring accurate user account management.
Played a central role in deploying Identity Access Management (IAM) solutions and enhancing user provisioning through SailPoint Identity IQ and Identity Now.
Developed and customized SailPoint rules including Build Map Rules, Correlation Rules, and Manager Correlation Rules to tailor identity processing.
Hands-on in managing resources in Microsoft Azure AD, including user management, license assignments, and domain configurations.
Defined Azure roles and permissions across different levels—management groups, subscriptions, and resource groups—for secure and scalable access control.
Built and configured Life Cycle Management (LCM) events and custom workflows for streamlined provisioning and de-provisioning of users.
Created Java-based custom tasks and rules to extend SailPoint's out-of-the-box capabilities, tailored to business-specific workflows.
Integrated ServiceNow with SailPoint to automate ticket creation, AD group retrieval, and improve identity request processes.
Developed automation scripts using SQL and PowerShell to support audit reporting, data cleanup, and stale account detection.
Implemented custom connectors and RESTful Web Services to bridge SailPoint with external applications, enhancing data flow and visibility.
Delivered advanced certifications such as Application Owner, Entitlement Owner, and Manager Certifications to enforce governance policies.
Worked closely with RPA teams (UiPath) to automate business processes and contributed to the development of a dashboard for ROI tracking.
Integrated CyberArk with SailPoint to manage Privileged Access Management (PAM) and created automated provisioning flows for secure vault usage.
Managed SSO and MFA integration with identity providers like Okta and Azure AD, enhancing authentication and user experience.
Participated in all SailPoint deployment activities like connector configuration, custom rule development, workflow configuration and development, and third-party system integration.
Migrated SailPoint solutions to AWS cloud, automating compliance monitoring and aligning with audit and security standards.
Hands on experience on Password Management, installed PWI in Active Directory and synchronized passwords into Sail point.
Onboarded over 50+ enterprise applications into SailPoint IIQ and Identity Now within a 6-month period
Designed custom reports that improved audit readiness and compliance response time by 40%.
Maintained detailed process documentation, trained end-users, and supported ongoing operations to ensure smooth adoption of IAM solutions.
Developed and executed comprehensive SIT and UAT test cases to validate IAM workflows, connectors, and provisioning logic, ensuring alignment with business and security requirements.
Trained clients on managing IAM infrastructure, including SailPoint administration, access reviews, and best practices for system monitoring and lifecycle operations.
Environment:
SailPoint Identity IQ, Identity Now, Microsoft Azure AD, Active Directory, CyberArk, JDBC, Delimited Connectors, PowerShell, Java, SQL, ServiceNow Integration, SSO, MFA, RPA (UiPath), REST APIs, AWS Cloud, PAM, Access Certifications, Lifecycle Management, Audit & Compliance, Custom Connector Development.